Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Nutanix > Nutanix Certified Professional (NCP) > NCP-5.10

NCP-5.10 Nutanix Certified Professional (NCP) 5.10 Exam Question and Answers

Question # 4

An administrator is migrating ESXi VMs to a Nutanix AHV cluster. The VM data is available to the AHV system.

Which process must the administrator complete below AHV VMs can be create?

A.

Import the VMs .vmx file using the Image Service

B.

Rename the –flat.vmdk files for the VM based on the VM UUID

C.

Import the VM’s –flad.vmdk files using the Image Service

D.

Import the VM’s .nvram file using the Image Service

Full Access
Question # 5

Which process should a cluster administrator follow to determine the uplink bond configuration node?

A.

Log into the Nutanix CVM and execute the command manage_ovs_update_uplinks

B.

Log into the Nutanix AHV host and execute the command ovs-appctl bond.show

C.

Log into the Nutanix AHV host and execute the command ifconfig br0

D.

Log into the Nutanix CVM and execute the command ovs-vsctl show

Full Access
Question # 6

An administrator needs to configure Acropolis File Service (AFS). The administrator is setting up AFS for the first time on the Nutanix cluster.

How many file services VMs are created by default?

A.

4

B.

3

C.

2

D.

1

Full Access
Question # 7

through what interfaces is/are (anti-)affinity rules configured. (Choose three)

A.

affinity :cli

B.

anti-affinity :cli

C.

affinity :prism

D.

anti-affinity :prism

Full Access
Question # 8

The feature that enables you to back up and restore copies of virtual machines and files to and from an on-prem cluster and a Nutanix Controller VM on the Amazon Web Service (AWS) or Microsoft Azure cloud.

A.

XI-Leap

B.

Cloud Connect

C.

Acropolis Block Service

Full Access
Question # 9

An administrator has an existing Nutanix cluster that is configured to protect VMs using. Time Stream. The administrator now needs to add support for protecting these VMs in AWs.

Which two changes must be made to the cluster to meet this requirement? (Choose two)

A.

Configure protection domains with a 15-minute schedule.

B.

Add the remote site to the existing protection domains.

C.

Configure a remote site.

D.

Deploy a remote site for another cluster.

Full Access
Question # 10

Which option should the administrator select from the web console to access the prism Rest API Explorer?

A.

Gear icon

B.

Tasks Dashboards

C.

User Icon

D.

Home Dashboard

Full Access
Question # 11

what command is used to run the nutanix cluster checks from the CVM CLI?

A.

ncc health_check run_all

B.

ncc run_all_health_check

C.

ncc check_all health_options

D.

ncc check_health run_all

Full Access
Question # 12

Which service performs snapshots in an AOS 5.5 implementations?

A.

Medusa

B.

Zookeeper

C.

celebro

D.

Stargate

E.

Prism

Full Access
Question # 13

An administrator needs to take a single node down for maintenance. Which two steps should the administrator take? (Choose two)

A.

Make sure Auto Evacuation is enabled

B.

Shut down or live migrate all VMs off of the node.

C.

Verify the data resiliency status of the cluster.

D.

Reclaim the licenses to the Nutanix Support Portal.

Full Access
Question # 14

A catastrophic failure occurs at the primary data center. A protection domain has been set up. All required data has been replicated to an offsite DR location.

Which button should an administrator click on at the remote site's protection domain to bring up the replicated VMs?

A.

Migrate

B.

Replicate

C.

Online

D.

Activate

Full Access
Question # 15

For security reason an administrator needs to logically separate management and data traffic on Nutanix cluster.

Which feature should the administrator select for this configuration?

A.

Prism Central

B.

Network Virtualization

C.

Network Segmentation

D.

Microsegmentation

Full Access
Question # 16

An administrator is working with sensitive data and wants to encrypt that data by Nutanix Software Encryption.

Which three types of information and components are required to enable this configuration? (Choose three)

A.

Key Management Server (KMS)

B.

Root Certificate Authority (CA)

C.

Signed Certificate for each CVM

D.

KMS Certificate

E.

Self-Encryption Drives (SED)

Full Access
Question # 17

what disk formats are supported by the image service?

A.

vhd,raw,vmdk,vdi,iso,qcow2

B.

qcow2,vdi,raw,udf,iso

C.

raw,ova,vmdk,qcow2,vdi

D.

vmdk,qcow2,vdi,ovf,raw

Full Access
Question # 18

An administrator is preparing to migrate VMs from a legacy ESXi cluster to a new AHV cluster.

Which action must be the administrator perform on the AHV cluster to migrate VM data?

A.

Install the Nutanix Virt0 drivers

B.

Whitelist the ESXi cluster IP address

C.

Create placeholder VMs

D.

Install Nutanix Self servicing restore.

Full Access
Question # 19

An administrator logs in to Prism Element goes to the Network view, and sees the output shown in the exhibit.

Which three steps must the administrator take to increase throughput to the host? (Choose three.)

A.

Connect the 10Gb interfaces to the physical switch.

B.

Change the bond mode to balance-slb or balance—tcp.

C.

Remove any 1Gb interfaces still connected from the default bond.

D.

Add a new switch to the network and connect 1Gb interfaces to it.

E.

Change the VLAN ID to a higher priority ID.

Full Access
Question # 20

When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the event of a host failure?

A.

Restart on a best-effort basis if resources are available

B.

Perform a live migration to other hosts in the AHV cluster

C.

Restart on other hosts in the AHV cluster

D.

Perform a live migration on a best-effort basis if resources are available

Full Access
Question # 21

CPU utilization climbs above 90% on several VMs. This causes performance degradation for a business-critical application.

How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?

A.

On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below 90%.

B.

On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%.

C.

On a CVM, configure a cron job to run the VM CPU Check more frequently and email the result.

D.

On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve.

Full Access
Question # 22

Where are Leap Availability Zones configured?

A.

Cloud Connect

B.

Controller VM

C.

Prism Element

D.

Prism Central

Full Access
Question # 23

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?

A.

Disk Clones

B.

Golden Images

C.

Volume Groups

D.

Shadow Clones

Full Access
Question # 24

A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements. Only three nodes in the cluster meet this requirement.

The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements.

How should the administrator perform this task?

A.

Create a sperate three-node cluster using the nodes that meet the requirement.

B.

Configure VM-Host affinity for the nodes that meet the application's GPU requirement.

C.

Over-Provision the application VM with additional virtual GPUs.

D.

Configure anti-affinity rules between the application VM and the other VMs running on the cluster.

Full Access
Question # 25

What is the function of the virbr0 bridge on AHV?

A.

To carry all traffic between the user VMs and the upstream network.

B.

To carry management and storage communication between user VMs and the CVM.

C.

To carry management and storage communication between user VMs and AHV host.

D.

To carry storage communication between the guest VMs and the CVM

Full Access
Question # 26

A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates.

However, no one from the outside can access the application.

What is the likely cause of this problem?

A.

A shared volume group must be used by all isolated VMs

B.

More than one NIC cannot be added to a VM

C.

One of the NICs needs to be configured on the internal VLAN

D.

Wireshark is installed on the NAT VM

Full Access
Question # 27

Where should an administrator unregister Prism Element from Prism Central?

A.

From the Prism Element web console

B.

From a Host SSH session

C.

From a CVM SSH session

D.

From the Prism Central web console

Full Access
Question # 28

How many Prism Central instances are required to deploy Leap:

A.

One per availability zone

B.

One per customer environment

C.

One per physical site

D.

One per AHV cluster

Full Access
Question # 29

What is the proper sequence to perform a one-click upgrade to a Nutanix cluster?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Full Access
Question # 30

A two-node ROBO cluster is configured with a witness VM.

What happens when Node A goes down?

A.

The- cluster becomes unavailable and goes into read-only mode.

B.

All operations and services on the Node B are shut down and go into a waiting state.

C.

The cluster is unaffected and no administrator intervention is required.

D.

Node B sends a leadership request to the Witness VM and goes into single-node mode.

Full Access
Question # 31

An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.

Which three things must be configured for Volumes to support iSCSI clients? (Choose three)

A.

Enable external client access

B.

Client OS iSCSI initiator

C.

iSCSI Multipathing I/O

D.

Cluster Virtual IP address

E.

Data Services IP address

Full Access
Question # 32

In which two scenarios is Native Key Management Server supported? (Choose two)

A.

XenServer and AHV mixed cluster.

B.

Hyper-V and AHV mixed cluster.

C.

KVM and AHV mixed cluster.

D.

ESXi and AHV mixed cluster.

Full Access
Question # 33

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

Full Access
Question # 34

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Full Access
Question # 35

An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent

users. During business hours, the CPU on the applications servers runs at close to 100%. The

administrator needs to determine if there is a performance issue specific to the app servers, the database

servers, or all servers on the cluster.

Which metrics should the administrator review in Prism Analytics Graphs?

A.

Cluster CPU and Memory Only

B.

Cluster IO, Network, Database and App Server CPU

C.

Cluster IO, CPU, Memory and Database and App Server CPU

D.

Cluster IO, CPU, Memory, Network, App Server CPU

Full Access